NVD Vulnerability Detail
Search Exploit, PoC
CVE-2019-1599
Summary

A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Nexus 1000V Switch for Microsoft Hyper-V is affected in versions prior to 5.2(1)SM3(2.1). Nexus 1000V Switch for VMware vSphere is affected in versions prior to 5.2(1)SV3(4.1a). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(6) and 9.2(2). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(11), 7.0(3)I7(6), and 9.2(2). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5) and 9.2(2). Nexus 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(5)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22. Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5) and 9.2(2). UCS 6200 and 6300 Series Fabric Interconnect are affected in versions prior to 3.2(3j) and 4.0(2a). UCS 6400 Series Fabric Interconnect are affected in versions prior to 4.0(2a).

Publication Date March 8, 2019, 5:29 a.m.
Registration Date Jan. 26, 2021, 11:39 a.m.
Last Update Nov. 21, 2024, 1:36 p.m.
CVSS3.1 : HIGH
スコア 8.6
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更あり
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
CVSS2.0 : HIGH
Score 7.8
Vector AV:N/AC:L/Au:N/C:N/I:N/A:C
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 9.2 9.2\(2\)
execution environment
1 cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*
3 cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.0\(3\) 7.0\(3\)i7\(5\)
execution environment
1 cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.0\(3\) 7.0\(3\)f3\(5\)
execution environment
1 cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.2 7.3\(5\)n1\(1\)
execution environment
1 cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*
3 cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 8.3 8.3\(2\)
execution environment
1 cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 9.2 9.2\(2\)
execution environment
1 cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*
Configuration7 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 6.0\(2\)a8\(11\)
execution environment
1 cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*
Configuration8 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 6.2\(22\)
execution environment
1 cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*
Configuration9 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.0\(3\)i5 7.0\(3\)i7\(6\)
execution environment
1 cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
Configuration10 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.0\(3\) 7.0\(3\)f3\(5\)
execution environment
1 cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*
Configuration11 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 5.2\(1\)sm3\(2.1\)
execution environment
1 cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:microsoft_hyper-v:*:*
Configuration12 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 5.2\(1\)sv3\(4.1a\)
execution environment
1 cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:*
Configuration13 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 4.0 4.0\(2a\)
execution environment
1 cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*
Configuration14 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 4.0 4.0\(2a\)
execution environment
1 cpe:2.3:h:cisco:ucs_6400:-:*:*:*:*:*:*:*
Configuration15 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 3.2\(3j\)
execution environment
1 cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*
Configuration16 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.0\(3\)i4\(9\)
execution environment
1 cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
Configuration17 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.1\(5\)n1\(1b\)
execution environment
1 cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*
3 cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*
Configuration18 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 8.0 8.2\(3\)
execution environment
1 cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*
Configuration19 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.2 7.3\(3\)d1\(1\)
execution environment
1 cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
2 cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*
Configuration20 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.0\(3\)i5 7.0\(3\)i7\(6\)
execution environment
1 cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*
Configuration21 or higher or less more than less than
cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* 7.0\(3\)i4\(9\)
execution environment
1 cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
Cisco NX-OS ソフトウェアにおけるリソース管理に関する脆弱性
Title Cisco NX-OS ソフトウェアにおけるリソース管理に関する脆弱性
Summary

Cisco NX-OS ソフトウェアには、リソース管理に関する脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 6, 2019, midnight
Registration Date April 9, 2019, 4:24 p.m.
Last Update April 9, 2019, 4:24 p.m.
Affected System
シスコシステムズ
Cisco NX-OS 
Cisco NX-OS 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2019年04月09日]
  掲載
April 9, 2019, 4:24 p.m.